HackDig : Dig high-quality web security articles for hacker

The U.S. Food and Drug Administration (FDA) cautioned the health care industry to be wary about networked medical devices containing off-the-shelf (OTS) software that can connect to networks. Both health care IT professionals and manufacturers are responsible for securing medical devices by performing regular software updates and applying security patches.
S

As we approach the holiday season, both consumers and IT professionals are considering replacing their old devices with a whole new lineup of smartphones, phablets and tablets. Whether you’re treating yourself, adding to your wish list or considering options for your next enterprise rollout, it’s important to weigh the pros and cons of introducin

People are beginning to get used to the easy life enabled by smart homes and the Internet of Things (IoT), but they are at risk if they do not prioritize security. The IoT has increased quality of life for many; it has helped the differently abled and the elderly to continue living independently and laid the technological groundwork for another industrial re

Everyone else had already left for the day, but the Apprentice felt like his day was just beginning. He knew his internship with the IT department at Wizard, Inc. would be a challenge, but he never expected how challenging his final project — enterprise mobility management (EMM) — would be. The chief information officer (CIO) tasked him with securing all dev

Zimperium’s core machine learning engine, z9, has a proven track record of detecting zero-day exploits. We recently announced an extension of the framework that detects previously unknown mobile malware. This extension is known as “z9 for Mobile Malware”, and was officially announced in September 2017. Internally, the code name has been “Cogito”, so this res

What is KRACK?
KRACK (Key Reinstallation attaCKs, KRACKs) is a serious weakness in the WPA2 protocol. WPA2 secures all modern protected Wi-Fi networks including those used by smartphones. Attackers within physical range of a Wi-Fi network can exploit protocol weaknesses by using key reinstallation attacks. The attack works against all modern protected Wi-Fi

After the FBI issued a warning on internet-connected toys in July, researchers began digging into these devices to assess their functions as they relate to cybersecurity. But before describing what one of these toys can do, it might be helpful to explain how they work at a very high level.
Typical Components of Internet-Connected Toys
The first component of

Bluetooth is an important smartphone technology, allowing us to transfer files, or to listen to music, wirelessly. It’s so useful that many people leave it switched on all the time.
But researchers have discovered a vulnerability in the technology that allows hackers to take control of a victim’s phone remotely. Known as “BlueBorne”, the technique can be use

The benefits of a comprehensive IT asset management (ITAM) program may seem obvious since it provides the data needed to strategically and tactically manage the life cycle of IT assets from purchase to end of life. Of course, companies can leverage IT asset management to reduce costs, improve operational efficiency, determine the full cost of existing invest

Oreo Android, the sweetest version?
What does an Oreo cookie, a donut, a marshmallow or a lollipop have to do with your smartphone? Well, believe it or not, the names of all those sweets indicate the Android operating system installed on your cell phone.
After months of speculation about the new features to be included in the new Android operating system, Au

What happens when cable and phone companies are left to their own devices?
Federal Communications Commission (FCC) will soon stop accepting comments on Net Neutrality. There has been a lot of confusion amongst people who are either not technology savvy or not familiar enough with the ongoing debate. We spent years following the conversation and researching t

At least for the time being, business travelers will still be able to take their laptops and tablets along as carry-on luggage when they board a flight. That is the decision by the Transportation Safety Administration (TSA), which lifted its ban on air passengers carrying aboard personal electronic devices larger than a smartphone earlier this summer.
The

Is telepathy texting the next step in technology communications?
With over 2 billion registered members, Facebook is the world’s most popular online service. But to maintain that title, Facebook is constantly developing new services to keep people logging in. In a recent video conference, Facebook chief Mark Zuckerberg discussed one of the cutting edge proje

While some are in back-to-school mode and others are getting ready for football, we’re gearing up for the latest mobile operating systems to hit the market.
With the Apple iOS 11 release right around the corner, the time is now for IT and security leaders to zero in on their Apple iOS management strategy to prepare for the myriad changes set to affec

Everywhere we look, we see some form of digital technology. People have access to computers, cellphones, televisions and even Wi-Fi-enabled smart appliances. Technology advances every day, giving way to exciting, innovative and life-changing experiences.
Take cellphones, for example. Not too long ago, cellphones were a luxury. They were used simply to call p